{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T05:24:56Z","timestamp":1768627496788,"version":"3.49.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319728162","type":"print"},{"value":"9783319728179","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_14","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T11:44:29Z","timestamp":1513856669000},"page":"210-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation"],"prefix":"10.1007","author":[{"given":"Vasiliki","family":"Diamantopoulou","sequence":"first","affiliation":[]},{"given":"Michalis","family":"Pavlidis","sequence":"additional","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"14_CR1","volume-title":"Notes on the Synthesis of Form","author":"C Alexander","year":"1964","unstructured":"Alexander, C.: Notes on the Synthesis of Form, vol. 5. Harvard University Press, Cambridge (1964)"},{"key":"14_CR2","volume-title":"Information Systems Development: Methodologies, Techniques and Tools","author":"D Avison","year":"2003","unstructured":"Avison, D., Fitzgerald, G.: Information Systems Development: Methodologies, Techniques and Tools. McGraw Hill, Maidenhead (2003)"},{"issue":"8","key":"14_CR3","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1111\/j.1467-9280.2006.01759.x","volume":"17","author":"M Bar","year":"2006","unstructured":"Bar, M., Neta, M.: Humans prefer curved visual objects. Psychol. Sci. 17(8), 645\u2013648 (2006)","journal-title":"Psychol. Sci."},{"key":"14_CR4","unstructured":"Bertin, J.: Semiology of Graphics: Diagrams, Networks, Maps (1983)"},{"key":"14_CR5","unstructured":"Blackwell, A., Green, T.: Cognitive dimensions of notations resource site (2009). http:\/\/www.cl.cam.ac.uk\/afb21\/CognitiveDimensions"},{"key":"14_CR6","unstructured":"Butler, J., Holden, K., Lidwell, W.: Universal Principles of Design: A Cross-Disciplinary Reference (2003)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Caire, P., Genon, N., Heymans, P., Moody, D.L.: Visual notation design 2.0: towards user comprehensible requirements engineering notations. In: 2013 21st IEEE International Requirements Engineering Conference (RE), pp. 115\u2013124. IEEE (2013)","DOI":"10.1109\/RE.2013.6636711"},{"key":"14_CR8","volume-title":"Structured Analysis and System Specification","author":"T DeMarco","year":"1979","unstructured":"DeMarco, T.: Structured Analysis and System Specification. Yourdon Press, Upper Saddle River (1979)"},{"issue":"2","key":"14_CR9","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.aei.2006.11.004","volume":"21","author":"A Gehlert","year":"2007","unstructured":"Gehlert, A., Esswein, W.: Toward a formal research framework for ontological analyses. Adv. Eng. Inform. 21(2), 119\u2013131 (2007)","journal-title":"Adv. Eng. Inform."},{"issue":"4","key":"14_CR10","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1080\/00221300009598596","volume":"127","author":"P Goolkasian","year":"2000","unstructured":"Goolkasian, P.: Pictures, words, and sounds: from which format are we best able to reason? J. Gen. Psychol. 127(4), 439\u2013459 (2000)","journal-title":"J. Gen. Psychol."},{"key":"14_CR11","unstructured":"Grady, B.: Object-Oriented Analysis and Design with Applications (1994)"},{"issue":"2","key":"14_CR12","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1006\/jvlc.1996.0009","volume":"7","author":"TRG Green","year":"1996","unstructured":"Green, T.R.G., Petre, M.: Usability analysis of visual programming environments: a \u2018cognitive dimensions\u2019 framework. J. Vis.Lang. Comput. 7(2), 131\u2013174 (1996)","journal-title":"J. Vis.Lang. Comput."},{"key":"14_CR13","unstructured":"Green, T.R.: Cognitive dimensions of notations. In: People and Computers V, pp. 443\u2013460 (1989)"},{"issue":"4","key":"14_CR14","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1006\/jvlc.1999.0130","volume":"10","author":"CA Gurr","year":"1999","unstructured":"Gurr, C.A.: Effective diagrammatic communication: syntactic, semantic and pragmatic issues. J. Vis. Lang. Comput. 10(4), 317\u2013342 (1999)","journal-title":"J. Vis. Lang. Comput."},{"issue":"5","key":"14_CR15","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1145\/42411.42414","volume":"31","author":"D Harel","year":"1988","unstructured":"Harel, D.: On visual formalisms. Commun. ACM 31(5), 514\u2013530 (1988)","journal-title":"Commun. ACM"},{"issue":"10","key":"14_CR16","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MC.2004.172","volume":"37","author":"D Harel","year":"2004","unstructured":"Harel, D., Rumpe, B.: Meaningful modeling: what\u2019s the semantics of \u201csemantics\u201d? Computer 37(10), 64\u201372 (2004)","journal-title":"Computer"},{"issue":"1","key":"14_CR17","first-page":"10","volume":"9","author":"S Hitchman","year":"2002","unstructured":"Hitchman, S.: The details of conceptual modelling notations are important-a comparison of relationship normative language. Commun. Assoc. Inf. Syst. 9(1), 10 (2002)","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"1","key":"14_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/606658.606659","volume":"10","author":"P Irani","year":"2003","unstructured":"Irani, P., Ware, C.: Diagramming information structures using 3d perceptual primitives. ACM Transactions on Computer-Human Interaction (TOCHI) 10(1), 1\u201319 (2003)","journal-title":"ACM Transactions on Computer-Human Interaction (TOCHI)"},{"issue":"1","key":"14_CR19","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1207\/S15326985EP3801_4","volume":"38","author":"S Kalyuga","year":"2003","unstructured":"Kalyuga, S., Ayres, P., Chandler, P., Sweller, J.: The expertise reversal effect. Educ. Psychol. 38(1), 23\u201331 (2003)","journal-title":"Educ. Psychol."},{"issue":"7","key":"14_CR20","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.jss.2005.06.046","volume":"79","author":"J Kim","year":"2006","unstructured":"Kim, J., Kim, M., Park, S.: Goal and scenario based domain requirements analysis environment. J. Syst. Softw. 79(7), 926\u2013938 (2006)","journal-title":"J. Syst. Softw."},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/3-540-44590-0_11","volume-title":"Theory and Application of Diagrams","author":"A Klopp Lemon von","year":"2000","unstructured":"von Klopp Lemon, A., von Klopp Lemon, O.: Constraint matching for diagram design: qualitative visual languages. In: Anderson, M., Cheng, P., Haarslev, V. (eds.) Diagrams 2000. LNCS (LNAI), vol. 1889, pp. 74\u201388. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44590-0_11"},{"key":"14_CR22","series-title":"The Enterprise Engineering Series","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-01310-2","volume-title":"Enterprise Architecture at Work: Modelling, Communication and Analysis","author":"M Lankhorst","year":"2009","unstructured":"Lankhorst, M.: Enterprise Architecture at Work: Modelling, Communication and Analysis. The Enterprise Engineering Series. Springer, Heidelberg (2009)"},{"issue":"1","key":"14_CR23","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1111\/j.1551-6708.1987.tb00863.x","volume":"11","author":"JH Larkin","year":"1987","unstructured":"Larkin, J.H., Simon, H.A.: Why a diagram is (sometimes) worth ten thousand words. Cogn. Sci. 11(1), 65\u2013100 (1987)","journal-title":"Cogn. Sci."},{"issue":"4","key":"14_CR24","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","volume":"32","author":"D Mellado","year":"2010","unstructured":"Mellado, D., Blanco, C., S\u00e1nchez, L.E., Fern\u00e1ndez-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4), 153\u2013165 (2010)","journal-title":"Comput. Stand. Interfaces"},{"issue":"6","key":"14_CR25","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1109\/TSE.2009.67","volume":"35","author":"D Moody","year":"2009","unstructured":"Moody, D.: The \u201cphysics\u201d of notations: toward a scientific basis for constructing visual notations in software engineering. IEEE Trans. Softw. Eng. 35(6), 756\u2013779 (2009)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"14_CR26","unstructured":"Moody, D.L.: Complexity effects on end user understanding of data models: An experimental comparison of large data model representation methods. In: ECIS 2002 Proceedings, p. 10 (2002)"},{"key":"14_CR27","unstructured":"Mouratidis, H.: A natural extension of tropos methodology for modelling security (2002)"},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-39417-6_16","volume-title":"Domain-Specific Conceptual Modeling: Concepts, Methods and Tools","author":"H Mouratidis","year":"2016","unstructured":"Mouratidis, H., Argyropoulos, N., Shei, S.: Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach. Domain-Specific Conceptual Modeling: Concepts, Methods and Tools, pp. 357\u2013380. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39417-6_16"},{"issue":"2","key":"14_CR29","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1046\/j.1365-2575.1999.00052.x","volume":"9","author":"JC Nordbotten","year":"1999","unstructured":"Nordbotten, J.C., Crosby, M.E.: The effect of graphic style on data model interpretation. Inf. Syst. J. 9(2), 139\u2013155 (1999)","journal-title":"Inf. Syst. J."},{"issue":"1","key":"14_CR30","first-page":"43","volume":"1","author":"AL Opdahl","year":"2002","unstructured":"Opdahl, A.L., Henderson-Sellers, B.: Ontological evaluation of the uml using the Bunge-Wand-Weber model. Softw. Syst. Model. 1(1), 43\u201367 (2002)","journal-title":"Softw. Syst. Model."},{"key":"14_CR31","unstructured":"Pavlidis, M., Islam, S.: Sectro: a case tool for modelling security in requirements engineering using secure tropos. In: CAiSE Forum, pp. 89\u201396 (2011)"},{"issue":"3","key":"14_CR32","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1023\/A:1016344215610","volume":"7","author":"HC Purchase","year":"2002","unstructured":"Purchase, H.C., Carrington, D., Allder, J.A.: Empirical evaluation of aesthetics-based graph layout. Empirical Softw. Eng. 7(3), 233\u2013255 (2002)","journal-title":"Empirical Softw. Eng."},{"issue":"1","key":"14_CR33","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/S0378-7206(98)00078-0","volume":"35","author":"G Shanks","year":"1999","unstructured":"Shanks, G., Darke, P.: Understanding corporate data models. Inf. Manage. 35(1), 19\u201330 (1999)","journal-title":"Inf. Manage."},{"issue":"10","key":"14_CR34","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/944217.944244","volume":"46","author":"G Shanks","year":"2003","unstructured":"Shanks, G., Tansley, E., Weber, R.: Using ontology to validate conceptual models. Commun. ACM 46(10), 85\u201389 (2003)","journal-title":"Commun. ACM"},{"issue":"1","key":"14_CR35","doi-asserted-by":"crossref","first-page":"26","DOI":"10.4018\/jdm.2001010103","volume":"12","author":"K Siau","year":"2001","unstructured":"Siau, K., Cao, Q.: Unified modeling language: a complexity analysis. J. Database Manage. (JDM) 12(1), 26\u201334 (2001)","journal-title":"J. Database Manage. (JDM)"},{"issue":"2","key":"14_CR36","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/0361-476X(92)90055-4","volume":"17","author":"DA Wiegmann","year":"1992","unstructured":"Wiegmann, D.A., Dansereau, D.F., McCagg, E.C., Rewey, K.L., Pitre, U.: Effects of knowledge map characteristics on information processing. Contemp. Educ. Psychol. 17(2), 136\u2013155 (1992)","journal-title":"Contemp. Educ. Psychol."},{"issue":"3","key":"14_CR37","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/47.59083","volume":"33","author":"W Winn","year":"1990","unstructured":"Winn, W.: Encoding and retrieval of information in maps and diagrams. IEEE Trans. Prof. Commun. 33(3), 103\u2013107 (1990)","journal-title":"IEEE Trans. Prof. Commun."},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Yu, E., Liu, L., Mylopoulos, J.: A social ontology for integrating security and software engineering. In: Integrating Security and Software Engineering: Advances and Future Actions, pp. 70\u2013105 (2006)","DOI":"10.4018\/978-1-59904-147-6.ch004"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T07:45:46Z","timestamp":1570520746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}